Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Grafana and NGINX are partnering to give the open source community a turnkey experience for visibility

Over the past few years, NGINX users have naturally gravitated toward Grafana, and vice versa. These days, it’s not uncommon to see these two open source tools used together in the wild. And for good reason. F5, which acquired NGINX last year, is prioritizing building visibility across the entire product set, to make it easy for customers to quickly gain the insights that they need. Meanwhile, Grafana has evolved into the primary visualization and analysis tool in the open source market.

Scaling Queue Workers Efficiently with AppSignal Metrics

Most web apps can benefit from a background queue, often used to process error-prone or time-consuming side jobs. These background jobs can vary from sending emails, to updating caches, to performing core business logic. As any background queueing system scales the number of jobs it needs to process, the pool of workers processing those jobs needs to scale as well.

Understand Complex Environments Without Being an Expert Using AppOptics for APM

Over the past two decades, two trends have completely reshaped the IT landscape: cloud computing and microservices. With cloud computing, organizations of all sizes can provision infrastructure and run applications on a global scale within minutes. And with microservices, these organizations can deploy highly scalable distributed workloads just as quickly.

I Can Do That, Dave: Exploring AIOps

The movies are filthy with examples of artificial intelligence. Some, like the first Terminator, are evil. Some, like the Star Wars droids, work for the good guys. And so many of them are flatly iconic—Blade Runner (both of them), 2001: A Space Odyssey, War Games, Westworld (the movie and the HBO series), Matrix[i] … the list keeps going and going. We aren’t at the point yet when we can get R2 to talk the Millennium Falcon—or the data center—and find out what’s wrong.

4 ways to use Catchpoint to drive remote workforce productivity

IT professionals are now adapting to a remote environment and learning to manage a distributed, homebound workforce. From a technical standpoint, the process of setting up a remote workforce is well-known. For this blog post let’s dive into one step of the process, which is arguably the most important, user experience monitoring.

Introduction to security monitoring

Security Information Monitoring or Security Event Monitoring is part of Security Information Management. Yes, I acknowledge they are flashy names and that even experts have their differences about concept and scope. Here in Pandora FMS, flexibility is part of our name, so, hereby, I will abbreviate it as Security Monitoring. As you can see, it is short and manageable!

Enabling DevSecOps with the Elastic Stack

Software development and delivery is an ever-changing landscape. Writing software was once an art form all its own, where you could write and deploy machine code with singleness of purpose and no concern for things like connecting to other computers. But as the world and the variety of systems that software supports became more complex, so did the ecosystem supporting software development.

Machine learning in cybersecurity: Detecting DGA activity in network data

In Part 1 of this blog series, we took a look at how we could use Elastic Stack machine learning to train a supervised classification model to detect malicious domains. In this second part, we will see how we can use the model we trained to enrich network data with classifications at ingest time. This will be useful for anyone who wants to detect potential DGA activity in their packetbeat data.

Distributed Tracing & Logging - Better Together

Monitoring requires a multi-faceted approach if DevOps teams want end-to-end visibility and deep insight into issues. This is especially true in the case of modern microservices applications, which are essentially collections of distributed services that talk to each other over a service mesh. With monolithic applications, requests can be tracked easily from the client to the server and back, but with modern applications, every request passes through numerous services before completion.